US8375420B2 - Challenge-response system and method - Google Patents
Challenge-response system and method Download PDFInfo
- Publication number
- US8375420B2 US8375420B2 US12/825,389 US82538910A US8375420B2 US 8375420 B2 US8375420 B2 US 8375420B2 US 82538910 A US82538910 A US 82538910A US 8375420 B2 US8375420 B2 US 8375420B2
- Authority
- US
- United States
- Prior art keywords
- client
- content
- server
- challenge
- value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
- 238000000034 method Methods 0.000 title claims abstract description 56
- 230000004044 response Effects 0.000 title claims description 71
- 238000013475 authorization Methods 0.000 claims abstract description 24
- 238000004891 communication Methods 0.000 claims description 11
- 230000008569 process Effects 0.000 description 7
- 230000008901 benefit Effects 0.000 description 5
- 230000007246 mechanism Effects 0.000 description 5
- 238000010200 validation analysis Methods 0.000 description 3
- 238000013459 approach Methods 0.000 description 2
- 238000009795 derivation Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 239000012634 fragment Substances 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000004043 responsiveness Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
Definitions
- This invention relates to a challenge-response system and method, in particular a content-based challenge-response system and method.
- some storage systems can detect that a user is attempting to upload a file that is a duplicate, and indicate to the user's client software that that upload is unnecessary, since a copy of the file is already present in the overall store. This improves the bandwidth efficiency of the service and the service's responsiveness to the user, since only one full copy of the file needs to be uploaded to the service.
- Deucour, J. et al (“Reclaiming space from duplicate files in a serverless distributed file system,” 22nd International Conference on Distributed Computing Systems, pp 617-624, July 2002) describes a distributed file system called Farsite that automatically detects duplication, and only stores a single version of a file.
- One mechanism that achieves this is to have the user's client software compute a hash of the file content using a cryptographic hash algorithm, such as SHA-256, and for the client software to send the hash value (which is a short, fixed-length value) to the service.
- the service can then check if any other file with the same hash value is already stored and if so, the upload can be avoided and the service can simply note that that user also has a copy of the file in question.
- the service will associate various pieces of user meta-data with the stored file, but doesn't require the user to upload the actual file content a second time, nor will the service have to store the file a second time.
- hash functions that were previously considered cryptographically strong e.g. MD5
- hash functions that were previously considered cryptographically strong e.g. MD5
- have been broken by cryptanalysis in various ways so a system using such a weak hash function for de-duplication could be vulnerable to guessed or colliding hash values.
- cryptographic techniques improve over time, what was once considered a secure hash function may become insecure.
- a content-based authorisation method operable in a server for authorising an operation requested by a client across a communications network, the method comprising the steps of:
- the client As the client is able to demonstrate that they are in possession of the requested part of the data item, it can be assumed that the client is either in possession of at least a first portion of entire data item, or that the client has been authorised to possess the data item. This allows the server to safely authorise the action requested by the client.
- the method comprises the step of generating a nonce value, and wherein said step of generating a challenge comprises including in said challenge said nonce, and wherein said authorising step is responsive to said received indication being based on a combination of said nonce and said first part of said content to authorise said operation.
- At least a portion of said response received from said client and including said indication is cryptographically processed.
- said cryptographically processed portion is based at least in part on said nonce.
- the response may comprise the hash value of the portion of the data item.
- the hash function SHA-256 may be applied to some combination of a nonce and a byte range.
- the method comprises the step of performing a secure cryptographic key exchange operation.
- Some challenge-response schemes might not require the generation of an explicit nonce, for example, schemes based on strong password protocols, like Encrypted Key Exchange (EKE).
- EKE Encrypted Key Exchange
- the shared secret between the parties i.e. between the client and the server
- the private values can be randomly generated and hence provide the anti-replay function of the nonce, e.g. Diffie-Hellman EKE.
- the method comprises the step of obtaining a server public value based on said at least first part of said content and a server private value, and wherein said step of generating a challenge comprises providing with said challenge said server public value and an indication of said at least first part of said content, and wherein said authorising step is further responsive to said response being based at least in part on said server public value.
- server private value which may be randomly generated, introduces a random element to the validation process, and can bypass the need for a nonce value.
- said step of obtaining a server public value comprises generating a server public Diffie-Hellman value.
- said authorising step is further responsive to said response being based on a client public value, wherein said client public value is based on said at least first part of said content.
- said authorising step is responsive to said response being based at least in part on a client public Diffie-Hellman value.
- said step of authorising is responsive to said response being based on said client public Diffie-Hellman value and an authenticator based on said server public Diffie-Hellman value, said at least first part of said content, and a client private Diffie-Hellman value.
- the method further comprises the step of: generating an authenticator value using a secret key, wherein the step of generating a challenge comprises embedding said authenticator value in said challenge, and wherein said step of authorising is responsive to said received response comprising an indicator of said authenticator value to authorise said operation.
- the method further comprises the step of selecting said at least first part of said content.
- the indication may refer to any characteristic portion of the data item in question, e.g. a specified byte range; a portion of text in a document; a value at a point on a graph; etc.
- one of said client or said server selects said indication of said at least first part of said content.
- said response includes said selection in addition to said indication.
- the challenge-response is based on the content of that portion of the data item that the client already possesses. If the client has previously been authorised to possess the first portion, then the server can assume that they are authorised to possess the remainder of the data item.
- the server can issue the challenge-response based on any portion of the data item. This may occur in for example an on-line storage system, where the server wishes to check if the client is correctly in possession of the data item in question.
- a content-based authorisation method for a hand-off operation between a central content server and a hand-off server across a communications network comprising the steps of at the central content server:
- This approach allows for a streamlined hand-off procedure between a central server and a separate hand-off server.
- the central server is tasked with the initial authorisation procedure (which may be relatively resource-intensive), and transmitting a first portion of the data item.
- the hand-off server does not have to provide an intensive authorisation mechanism, but simply checks if the client has received a first portion of the data item in question. If the client can prove this, then the hand-off server can assume that the client has already passed the intensive authorisation of the central server, and allows the further download of the data item from the hand-off server. This allows the authorisation procedure to be centralised in the central server, while the bulk of the download operations can be performed at distributed hand-off servers.
- said step of altering comprises breaking the communications connection between said central content server and said client once said at least first portion of said data item has been sent to said client.
- said step of altering comprises redirecting said client to said hand-off server.
- said step of redirecting comprises sending to said client a partial content response.
- a partial content response would be an HTTP response with response code 206.
- FIG. 1 is an illustration of an on-line storage and backup system
- FIG. 2 is a sample illustration of the method of the invention for the system of FIG. 1 ;
- FIG. 3 is an illustration of an on-line distributed content download system
- FIG. 4 is a sample illustration of the method of the invention for the system of FIG. 3 .
- the service has full knowledge of the content, and the user has, or only wants to demonstrate, partial knowledge.
- the user knows the hash-value of the overall content, and the aim is for the user to prove that they (almost certainly) actually have the full content.
- the HTTP use case the user has the partially downloaded file and the goal is to authorise access to the remainder of the file by demonstrating that the user (almost certainly) actually has previously accessed the partial content (and hence has been authorised for access to the full content).
- a challenge-response protocol is used to require the user to demonstrate that they possess the relevant partial or full content, and uses that result to then authorise the association in the storage system use case and the remaining or continued download in the HTTP use case.
- the shared secret must be managed via some out-of-band process, in this case, the partial content that the user claims to possess is used as the shared secret in the challenge-response system of the invention.
- randomly selected byte-range can be from anywhere in the file; in the HTTP use case, the byte-range has to be from the portion of the file that the user has previously acquired.
- variant requires that the user upload variable sized parts of the claimed content, which is undesirable for both bandwidth consumption reasons and because it could unnecessarily expose file content in some cases.
- variant is also vulnerable to replay attacks if the service selects the same or overlapping ranges, which is quite likely to occur with smaller files. (In such a case, an eavesdropper would see the relevant bytes of the file and could then answer challenges.)
- the service can include a random number (referred to as a “nonce”) in the challenge along with a specifier of the required byte-range, and require that the correct response be based on the nonce and the use of a hash function applied to the relevant byte range.
- a hash function like SHA-256
- H(nonce ⁇ H(byte-range) H(nonce ⁇ H(byte-range)
- ⁇ operator represents catenation. That response method provides “freshness” since the service can choose a different nonce each time, (or periodically), and the service can impose a time-window on the use of particular nonce-values, either on a per-user or other basis.
- this response format doesn't allow an eavesdropper to produce its own responses unless the eavesdropper does know the file content for the byte-range in question, thanks to the one-way nature of the hash function.
- This particular challenge-response scheme also has the benefit that the service doesn't need to identify the requesting user at this point in the process—all that is required is that the user be able to answer the relevant challenges.
- the size of the byte-range(s) requested and the number of iterations of the challenge/response cycle are configurable parameters of the scheme, where larger ranges and more iterations increase the service's confidence that the user actually is in possession of the claimed content.
- Variations of the content-based challenge-response scheme can also work where the two parties negotiate the byte-ranges to use as the shared secret. For example, in some applications it may be sufficient if the prover (the user) selects the byte-ranges to use. In other variations the byte-ranges could be negotiated via one or more exchanges. For example, a scheme where the service supplies a nonce as a challenge and the user side responds with H(nonce ⁇ H(byte-range)) ⁇ byte-range could be used.
- byte-range can refer to contiguous or non-contiguous ranges of bytes, specified via offsets or via some other method.
- An example of the latter where the content is structured as XML [XML] could be an XPath [XPATH] expression or other well-known methods of selecting partial content. If the prover and verifier were dealing with content stored in a relational database, then the byte-range could consist of the result upon execution of an SQL expression.
- the byte-range specifier could also be obfuscated, so that simply examining the challenge (or response) without knowledge of the file content does not immediately expose the actual byte-range. So, a challenge could specify a byte-range in terms of another byte-range, for example, “use the value of bytes 1000-1001 as the start of the range, and the value of byte 900-901 as the end of the range.” Such obfuscated byte-range specifiers make it harder for an eavesdropper that has different partial information to produce the correct response (or to verify the response, if the prover selects the byte-range).
- the nonce and byte-range are shown as being present in the challenge but not in the response.
- a variation of the scheme that allows the server to be less stateful would also include these values in the response. In that way the server need not store the nonce and byte-range selected for each transaction but can still verify the challenge-response.
- a protocol making use of this scheme does allow the nonce and byte-range to be part of the response value, then there is a requirement that the server be able to verify that those values were selected by it, and not simply chosen by the client.
- the server could store a secret key known only to it and embed an authenticator generated with that key, within or alongside the nonce value that authenticates both the nonce and the byte-range.
- the server could use that key to securely wrap the challenge, and the wrapped challenge could then be used by the client as the nonce.
- Such embedding can make use of message authentication codes or encryption schemes.
- EKE Encrypted Key Exchange
- key exchange systems allow two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel.
- the two parties may both possess a cryptographically weak secret (e.g. a simple password), but the secret is never openly transmitted during the operation.
- the full or partial file content takes the place of the shared secret in such a scheme. It is then possible to work backwards from the shared secret and the private value chosen (i.e. the random element) to generate appropriate public values for transmission as part of the validation process.
- Combining the content-challenge scheme with strong password protocols would typically involve sending the byte-range specifier together with the validator's public value, with the response being the prover's public value, which is based on a combination of the validator's public value, the prover's private value, and the shared secret (i.e. the partial content matching the byte-range specifier). Due to the nature of schemes like EKE, there would be no need for a separate nonce value, as the public values already involve random inputs.
- Some challenge-response schemes might not require the generation of an explicit nonce, as the private values can be randomly generated and hence provide the anti-replay function of the nonce, e.g. Diffie-Hellman EKE.
- the system presented supports a new way for a service to hand-off the bandwidth requirements for bulk downloads, while still preserving some security.
- the service could do the appropriate (and resource intensive) authentication and authorization of the user's initial request, then transfer a (sufficiently large) portion of the file before deliberately breaking the connection.
- the user's client can then attempt to re-connect to download the remaining bytes of the file, but that second HTTP request can now safely be handed off to another server or service that can use this content-based challenge response scheme instead of traditional, and more expensive, authentication and authorisation.
- the system does not require that the service to which the user is offloaded even be able to authenticate or authorize the user, which means that that service need not manage user credentials or access control lists, which represents a significant security advantage and simplification.
- KDF key derivation function
- the overall security of the system presented will depend on the predictability of the content in question. If a dishonest user on the Internet can predict the value (or is attempting to confirm a prediction), then the system doesn't add real security value, since it would allow the user to produce the proper responses.
- the threat is more serious, since it would allow users with partial information, e.g. anyone who can predict the bytes at the start of the file, to gain access to the rest of the file.
- the native file content is sufficiently unpredictable, or where the service provider can modify the initial bytes of the file content to make it unpredictable (e.g. via recoding), so that the scheme is still worthwhile.
- the main benefit of the scheme in such cases is that the initial computationally intensive authentication and authorisation required for the initial request are not required for subsequent partial downloads.
- the scheme offers security benefits.
- FIG. 1 A sample storage system is illustrated in FIG. 1 the system comprises a plurality of clients 10 connected with a central server 12 via network 14 .
- the central server 12 is coupled with a centralised storage apparatus 16 , where single copies of files can be stored, and are accessible across the entire network 14 .
- Each client 10 may have a plurality of files 18 which it is desired to upload to the central server 12 and storage apparatus 16 for archiving and later access.
- Client 10 may then proceed to upload those files 18 which are not already stored at the storage server 16 .
- the central server 12 is then operable to associate the client 10 with the newly-uploaded files 18 , as well as with any files already stored at the storage server 16 which the client 10 has proven that it already possesses.
- the storage system use case uses the HTTP protocol as its underlying transport, but, in contrast to the HTTP use case, does not require any changes to HTTP.
- the content-challenge scheme occurs within the payload of the HTTP protocol.
- a plurality of clients 20 are connected to the network 24 .
- the clients 10 (or users, “U”) are coupled, via network 24 , with a central content server 22 .
- the central content server 22 is coupled with storage means 26 , and an authentication server 28 .
- the user U On requesting content from the central content server 22 , the user U initially performs the (relatively expensive) authentication and authorisation with the content server 22 (“CS”) and the authentication server 28 .
- CS content server 22
- the user U can be sent the initial bytes of the file via the network 24 .
- the initial user request for the file may be combined with the authentication and authorisation process in any appropriate manner.
- the content server CS can break the connection. In the example shown in FIG. 4 , it is assumed that the user has received bytes 1-1,000 of a 10,000-byte file.
- the user's client software can issue another request for the remainder of the file, or even for the entire file, using standard HTTP mechanisms.
- Various well-known load-balancing schemes e.g. presenting different address (“A”) resource records in the domain name system (DNS), can be used to process this as a secondary request and can select a hand-off server 30 (“HS”) that also has a copy of the entire file stored locally in storage means 32 .
- the hand-off servers 30 and storage means 32 may be distributed about the network 24 , perhaps local to a particular group of clients 20 .
- the hand-off server HS can be configured to require the use of the content-based challenge scheme described here before providing the file content in response to the user U's request. This can easily be done by having the hand-off server HS respond to the user U's request with an HTTP “Unauthorized” error code (normally using the HTTP status code “401”), and issuing the challenge to the user U using the existing HTTP header field called “WWW-Authenticate” with a new authentication scheme, here called “CC” for content-challenge.
- the parameters of the CC scheme can include the nonce and byte-range specifiers.
- the CS will break off the connection to the user U after a pre-determined number of bytes, in which case the HS will know within what limits of the byte range the HS can issue a challenge on.
- the HS may enquire of the user U what range of bytes it possesses, and issue the challenge based on some byte-range within this region, or the HS may communicate with the central server in order to determine the range of bytes that were already sent to the user U.
- the user U's client software can respond with a repeat of the HTTP request (for the file content) but can now include the response to the challenge in the existing HTTP header “Authorization” header field with the value being the challenge-response.
- the HTTP response can include the actual bytes of the file, as requested by the user U.
- FIG. 4 An example of a sample interchange in the HTTP use case for the above example is shown in FIG. 4 (other HTTP header fields present are not shown).
- byte range can refer to an exact range of bytes in the item byte stream, or can refer to any other characteristic of the file in question, e.g. the number of times the letter ‘e’ occurs in a text document.
- the system of the present invention leverages the partial content of an item (via the challenge response scheme) in order to authorize access to the full content. Accordingly, the system requires much less overhead than other schemes to achieve the same effect, albeit that this scheme is dependent on the un-predictability of the content.
- the storage system use case mitigates a vulnerability that could otherwise be costly were hash-values to leak out, and were a dishonest user to get access to someone else's files. That could have significant reputation cost to the service based on the storage system.
- the HTTP use case provides a less onerous “middle-ground” way to secure access to file content in the face of either network failures or, alternatively, offloading schemes.
- the challenge-response scheme presented mitigates the problems outlined above, since for example the scheme would require that a hash function collision be generated in real time, and for a value that is unpredictable for the attacker, which is sufficient in many cases to make the attacker's job infeasible, even with a weakened hash function.
- HTTP use case refers to file downloading
- the HTTP protocol also supports file uploading (e.g. via the HTTP PUT or POST methods), and in some situations the same authentication and authorization overhead can be problematic.
- the details of the HTTP use case for the download situation are described, but the same problem, and the same solution, can also apply to the upload case.
- the HTTP use case could involve many different servers each serving parts of the file content, while the above embodiment describes a case with an initial HTTP server and a secondary server that uses the challenge-response scheme.
- system may be employed in any suitable client-server type interaction, e.g. a peer-to-peer network.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
Description
-
- “Network Security—PRIVATE Communication in a PUBLIC World”, Second edition, Kaufman, Perlman, Speciner, Prentice Hall, 2002. ISBN-13: 9780130460196
- Lee & Yeh, “A Self-Concealing Mechanism for Authentication of Portable Communication Systems” International Journal of Network Security, Vol. 6, No. 3, PP. 285-290, May 2008.
-
- receiving a request from the client to perform an operation in respect of a data item;
- generating a challenge based at least on the content of said data item, wherein said challenge comprises a request for an indication that the client has access to at least a first part of said content;
- sending said challenge to said client;
- responsive to receiving a response to said challenge from said client comprising said indication, authorising said operation.
-
- receiving a request from a client to download a data item from the central content server;
- performing an authorisation operation with said client;
- responsive to said authorisation operation, sending at least a first portion of said data item to said client; and
- altering the communications connection between said central content server and said client to cause said client to connect with the hand-off server once said at least first portion of said data item has been sent to said client, and wherein the method further comprises the steps of, at the hand-off server:
- receiving a request from said client to download at least a second portion said data item; and
- authorising said download operation by said client according to the first aspect of the invention.
-
- 1.
Client 10 specifies a list of hashes offiles 18 which user wants to upload. - 2.
Server 12 returns all the hashes that are not already contained in thestorage vault 18. - 3.
Client 10 sends the hashes that theserver 12 already has, and asks for them to be linked into the user's part of the overall store.
- 1.
-
- 1.
Client 10 specifies a list of hashes of files 18 (or ‘sums’) which the user wants to upload. - 2.
Server 12 issues the content challenge for eachfile 18 theclient 10 wants to upload. The challenge comprises the nonce generated by theserver 12 and at least one randomly chosen byte-range specifier (the “<fragment>” element). If theclient 10 wishes to upload a number of files, the challenge may also dictate which files are being challenged, by returning the sum value in respect of these files. - 3.
Client 10 responds with the required challenge-response, i.e. a hash based on the nonce and the relevant bytes from thefile 18. Again, if there areseveral files 18 queried, the responses may be distinguished by incorporating the sums of the original files 18. - 4. The server can then compare the received response(s) with the data contained in the
storage apparatus 16.Server 12 then returns all the hashes of files that are not already stored at thestorage server 16, including any hashes forfiles 18 where the challenge-response was invalid.
- 1.
Claims (18)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| IE20090506A IES20090506A2 (en) | 2009-07-02 | 2009-07-02 | A challenge-response system and method |
| IES2009/0506 | 2009-07-02 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| US20110004924A1 US20110004924A1 (en) | 2011-01-06 |
| US8375420B2 true US8375420B2 (en) | 2013-02-12 |
Family
ID=41460044
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US12/825,389 Active 2031-04-07 US8375420B2 (en) | 2009-07-02 | 2010-06-29 | Challenge-response system and method |
Country Status (2)
| Country | Link |
|---|---|
| US (1) | US8375420B2 (en) |
| IE (1) | IES20090506A2 (en) |
Cited By (36)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20150248697A1 (en) * | 2014-03-03 | 2015-09-03 | Palo Alto Research Center Incorporated | Method and apparatus for streaming advertisements in a scalable data broadcasting system |
| US9405708B1 (en) | 2015-02-04 | 2016-08-02 | Amazon Technologies, Inc. | Preventing attacks that rely on same-page merging by virtualization environment guests |
| US9660825B2 (en) | 2014-12-24 | 2017-05-23 | Cisco Technology, Inc. | System and method for multi-source multicasting in content-centric networks |
| US9832123B2 (en) | 2015-09-11 | 2017-11-28 | Cisco Technology, Inc. | Network named fragments in a content centric network |
| US9912776B2 (en) | 2015-12-02 | 2018-03-06 | Cisco Technology, Inc. | Explicit content deletion commands in a content centric network |
| US9916601B2 (en) * | 2014-03-21 | 2018-03-13 | Cisco Technology, Inc. | Marketplace for presenting advertisements in a scalable data broadcasting system |
| US9930146B2 (en) | 2016-04-04 | 2018-03-27 | Cisco Technology, Inc. | System and method for compressing content centric networking messages |
| US9954795B2 (en) | 2015-01-12 | 2018-04-24 | Cisco Technology, Inc. | Resource allocation using CCN manifests |
| US9977809B2 (en) | 2015-09-24 | 2018-05-22 | Cisco Technology, Inc. | Information and data framework in a content centric network |
| US9986034B2 (en) | 2015-08-03 | 2018-05-29 | Cisco Technology, Inc. | Transferring state in content centric network stacks |
| US10043016B2 (en) | 2016-02-29 | 2018-08-07 | Cisco Technology, Inc. | Method and system for name encryption agreement in a content centric network |
| US10051071B2 (en) | 2016-03-04 | 2018-08-14 | Cisco Technology, Inc. | Method and system for collecting historical network information in a content centric network |
| US10063414B2 (en) | 2016-05-13 | 2018-08-28 | Cisco Technology, Inc. | Updating a transport stack in a content centric network |
| US10067948B2 (en) | 2016-03-18 | 2018-09-04 | Cisco Technology, Inc. | Data deduping in content centric networking manifests |
| US10075401B2 (en) | 2015-03-18 | 2018-09-11 | Cisco Technology, Inc. | Pending interest table behavior |
| US10075402B2 (en) | 2015-06-24 | 2018-09-11 | Cisco Technology, Inc. | Flexible command and control in content centric networks |
| US10091330B2 (en) | 2016-03-23 | 2018-10-02 | Cisco Technology, Inc. | Interest scheduling by an information and data framework in a content centric network |
| US10097346B2 (en) | 2015-12-09 | 2018-10-09 | Cisco Technology, Inc. | Key catalogs in a content centric network |
| US10135948B2 (en) | 2016-10-31 | 2018-11-20 | Cisco Technology, Inc. | System and method for process migration in a content centric network |
| US10243851B2 (en) | 2016-11-21 | 2019-03-26 | Cisco Technology, Inc. | System and method for forwarder connection information in a content centric network |
| US10257271B2 (en) | 2016-01-11 | 2019-04-09 | Cisco Technology, Inc. | Chandra-Toueg consensus in a content centric network |
| US10264099B2 (en) | 2016-03-07 | 2019-04-16 | Cisco Technology, Inc. | Method and system for content closures in a content centric network |
| US10263965B2 (en) | 2015-10-16 | 2019-04-16 | Cisco Technology, Inc. | Encrypted CCNx |
| US10305864B2 (en) | 2016-01-25 | 2019-05-28 | Cisco Technology, Inc. | Method and system for interest encryption in a content centric network |
| US10311229B1 (en) | 2015-05-18 | 2019-06-04 | Amazon Technologies, Inc. | Mitigating timing side-channel attacks by obscuring alternatives in code |
| US10313227B2 (en) | 2015-09-24 | 2019-06-04 | Cisco Technology, Inc. | System and method for eliminating undetected interest looping in information-centric networks |
| US10320760B2 (en) | 2016-04-01 | 2019-06-11 | Cisco Technology, Inc. | Method and system for mutating and caching content in a content centric network |
| US10333840B2 (en) | 2015-02-06 | 2019-06-25 | Cisco Technology, Inc. | System and method for on-demand content exchange with adaptive naming in information-centric networks |
| US10355999B2 (en) | 2015-09-23 | 2019-07-16 | Cisco Technology, Inc. | Flow control with network named fragments |
| US10425503B2 (en) | 2016-04-07 | 2019-09-24 | Cisco Technology, Inc. | Shared pending interest table in a content centric network |
| US10454820B2 (en) | 2015-09-29 | 2019-10-22 | Cisco Technology, Inc. | System and method for stateless information-centric networking |
| US10701038B2 (en) | 2015-07-27 | 2020-06-30 | Cisco Technology, Inc. | Content negotiation in a content centric network |
| US10742596B2 (en) | 2016-03-04 | 2020-08-11 | Cisco Technology, Inc. | Method and system for reducing a collision probability of hash-based names using a publisher identifier |
| US10868665B1 (en) | 2015-05-18 | 2020-12-15 | Amazon Technologies, Inc. | Mitigating timing side-channel attacks by obscuring accesses to sensitive data |
| US11205194B2 (en) | 2019-04-30 | 2021-12-21 | Advanced New Technologies Co., Ltd. | Reliable user service system and method |
| US20240333699A1 (en) * | 2023-03-29 | 2024-10-03 | Matrixed Ip Holdings, Llc | Dynamic one-time use knowledge-based authentication via multi-sourced private data using artificial intelligence techniques |
Families Citing this family (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2012005739A1 (en) * | 2010-07-09 | 2012-01-12 | Hewlett-Packard Development Company, L.P. | Responses to server challenges included in a hypertext transfer protocol header |
| JP5644472B2 (en) * | 2010-12-21 | 2014-12-24 | ソニー株式会社 | Transfer device, client device, server device, playback device, and transfer method |
| US9727720B2 (en) * | 2012-11-30 | 2017-08-08 | Certicom Corp. | Challenge-response authentication using a masked response value |
| US11012435B2 (en) | 2017-12-19 | 2021-05-18 | International Business Machines Corporation | Multi factor authentication |
| US11122033B2 (en) * | 2017-12-19 | 2021-09-14 | International Business Machines Corporation | Multi factor authentication |
| US10553058B2 (en) * | 2018-06-29 | 2020-02-04 | Micron Technology, Inc. | Secure wireless lock-actuation exchange |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5313521A (en) * | 1992-04-15 | 1994-05-17 | Fujitsu Limited | Key distribution protocol for file transfer in the local area network |
| US6038597A (en) * | 1998-01-20 | 2000-03-14 | Dell U.S.A., L.P. | Method and apparatus for providing and accessing data at an internet site |
| US6105027A (en) * | 1997-03-10 | 2000-08-15 | Internet Dynamics, Inc. | Techniques for eliminating redundant access checking by access filters |
-
2009
- 2009-07-02 IE IE20090506A patent/IES20090506A2/en not_active IP Right Cessation
-
2010
- 2010-06-29 US US12/825,389 patent/US8375420B2/en active Active
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5313521A (en) * | 1992-04-15 | 1994-05-17 | Fujitsu Limited | Key distribution protocol for file transfer in the local area network |
| US6105027A (en) * | 1997-03-10 | 2000-08-15 | Internet Dynamics, Inc. | Techniques for eliminating redundant access checking by access filters |
| US6038597A (en) * | 1998-01-20 | 2000-03-14 | Dell U.S.A., L.P. | Method and apparatus for providing and accessing data at an internet site |
Cited By (43)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20150248697A1 (en) * | 2014-03-03 | 2015-09-03 | Palo Alto Research Center Incorporated | Method and apparatus for streaming advertisements in a scalable data broadcasting system |
| US10089651B2 (en) * | 2014-03-03 | 2018-10-02 | Cisco Technology, Inc. | Method and apparatus for streaming advertisements in a scalable data broadcasting system |
| US9916601B2 (en) * | 2014-03-21 | 2018-03-13 | Cisco Technology, Inc. | Marketplace for presenting advertisements in a scalable data broadcasting system |
| US9660825B2 (en) | 2014-12-24 | 2017-05-23 | Cisco Technology, Inc. | System and method for multi-source multicasting in content-centric networks |
| US10091012B2 (en) | 2014-12-24 | 2018-10-02 | Cisco Technology, Inc. | System and method for multi-source multicasting in content-centric networks |
| US9954795B2 (en) | 2015-01-12 | 2018-04-24 | Cisco Technology, Inc. | Resource allocation using CCN manifests |
| US9405708B1 (en) | 2015-02-04 | 2016-08-02 | Amazon Technologies, Inc. | Preventing attacks that rely on same-page merging by virtualization environment guests |
| US10333840B2 (en) | 2015-02-06 | 2019-06-25 | Cisco Technology, Inc. | System and method for on-demand content exchange with adaptive naming in information-centric networks |
| US10075401B2 (en) | 2015-03-18 | 2018-09-11 | Cisco Technology, Inc. | Pending interest table behavior |
| US10868665B1 (en) | 2015-05-18 | 2020-12-15 | Amazon Technologies, Inc. | Mitigating timing side-channel attacks by obscuring accesses to sensitive data |
| US10311229B1 (en) | 2015-05-18 | 2019-06-04 | Amazon Technologies, Inc. | Mitigating timing side-channel attacks by obscuring alternatives in code |
| US10075402B2 (en) | 2015-06-24 | 2018-09-11 | Cisco Technology, Inc. | Flexible command and control in content centric networks |
| US10701038B2 (en) | 2015-07-27 | 2020-06-30 | Cisco Technology, Inc. | Content negotiation in a content centric network |
| US9986034B2 (en) | 2015-08-03 | 2018-05-29 | Cisco Technology, Inc. | Transferring state in content centric network stacks |
| US10419345B2 (en) | 2015-09-11 | 2019-09-17 | Cisco Technology, Inc. | Network named fragments in a content centric network |
| US9832123B2 (en) | 2015-09-11 | 2017-11-28 | Cisco Technology, Inc. | Network named fragments in a content centric network |
| US10355999B2 (en) | 2015-09-23 | 2019-07-16 | Cisco Technology, Inc. | Flow control with network named fragments |
| US9977809B2 (en) | 2015-09-24 | 2018-05-22 | Cisco Technology, Inc. | Information and data framework in a content centric network |
| US10313227B2 (en) | 2015-09-24 | 2019-06-04 | Cisco Technology, Inc. | System and method for eliminating undetected interest looping in information-centric networks |
| US10454820B2 (en) | 2015-09-29 | 2019-10-22 | Cisco Technology, Inc. | System and method for stateless information-centric networking |
| US10263965B2 (en) | 2015-10-16 | 2019-04-16 | Cisco Technology, Inc. | Encrypted CCNx |
| US9912776B2 (en) | 2015-12-02 | 2018-03-06 | Cisco Technology, Inc. | Explicit content deletion commands in a content centric network |
| US10097346B2 (en) | 2015-12-09 | 2018-10-09 | Cisco Technology, Inc. | Key catalogs in a content centric network |
| US10581967B2 (en) | 2016-01-11 | 2020-03-03 | Cisco Technology, Inc. | Chandra-Toueg consensus in a content centric network |
| US10257271B2 (en) | 2016-01-11 | 2019-04-09 | Cisco Technology, Inc. | Chandra-Toueg consensus in a content centric network |
| US10305864B2 (en) | 2016-01-25 | 2019-05-28 | Cisco Technology, Inc. | Method and system for interest encryption in a content centric network |
| US10043016B2 (en) | 2016-02-29 | 2018-08-07 | Cisco Technology, Inc. | Method and system for name encryption agreement in a content centric network |
| US10742596B2 (en) | 2016-03-04 | 2020-08-11 | Cisco Technology, Inc. | Method and system for reducing a collision probability of hash-based names using a publisher identifier |
| US10051071B2 (en) | 2016-03-04 | 2018-08-14 | Cisco Technology, Inc. | Method and system for collecting historical network information in a content centric network |
| US10264099B2 (en) | 2016-03-07 | 2019-04-16 | Cisco Technology, Inc. | Method and system for content closures in a content centric network |
| US10067948B2 (en) | 2016-03-18 | 2018-09-04 | Cisco Technology, Inc. | Data deduping in content centric networking manifests |
| US10091330B2 (en) | 2016-03-23 | 2018-10-02 | Cisco Technology, Inc. | Interest scheduling by an information and data framework in a content centric network |
| US10320760B2 (en) | 2016-04-01 | 2019-06-11 | Cisco Technology, Inc. | Method and system for mutating and caching content in a content centric network |
| US10348865B2 (en) | 2016-04-04 | 2019-07-09 | Cisco Technology, Inc. | System and method for compressing content centric networking messages |
| US9930146B2 (en) | 2016-04-04 | 2018-03-27 | Cisco Technology, Inc. | System and method for compressing content centric networking messages |
| US10425503B2 (en) | 2016-04-07 | 2019-09-24 | Cisco Technology, Inc. | Shared pending interest table in a content centric network |
| US10404537B2 (en) | 2016-05-13 | 2019-09-03 | Cisco Technology, Inc. | Updating a transport stack in a content centric network |
| US10063414B2 (en) | 2016-05-13 | 2018-08-28 | Cisco Technology, Inc. | Updating a transport stack in a content centric network |
| US10135948B2 (en) | 2016-10-31 | 2018-11-20 | Cisco Technology, Inc. | System and method for process migration in a content centric network |
| US10721332B2 (en) | 2016-10-31 | 2020-07-21 | Cisco Technology, Inc. | System and method for process migration in a content centric network |
| US10243851B2 (en) | 2016-11-21 | 2019-03-26 | Cisco Technology, Inc. | System and method for forwarder connection information in a content centric network |
| US11205194B2 (en) | 2019-04-30 | 2021-12-21 | Advanced New Technologies Co., Ltd. | Reliable user service system and method |
| US20240333699A1 (en) * | 2023-03-29 | 2024-10-03 | Matrixed Ip Holdings, Llc | Dynamic one-time use knowledge-based authentication via multi-sourced private data using artificial intelligence techniques |
Also Published As
| Publication number | Publication date |
|---|---|
| US20110004924A1 (en) | 2011-01-06 |
| IES20090506A2 (en) | 2009-12-09 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US8375420B2 (en) | Challenge-response system and method | |
| US8631481B2 (en) | Access to a network for distributing digital content | |
| CN109347835B (en) | Information transmission method, client, server, and computer-readable storage medium | |
| US8719572B2 (en) | System and method for managing authentication cookie encryption keys | |
| CN100581097C (en) | System and method for transferring data between two computers | |
| US20220417241A1 (en) | Methods, Systems, and Devices for Server Control of Client Authorization Proof of Possession | |
| Viega et al. | Network security with openSSL: cryptography for secure communications | |
| US8196186B2 (en) | Security architecture for peer-to-peer storage system | |
| Kaaniche et al. | A secure client side deduplication scheme in cloud storage environments | |
| US7774611B2 (en) | Enforcing file authorization access | |
| US6064736A (en) | Systems, methods and computer program products that use an encrypted session for additional password verification | |
| EP1574080B1 (en) | Method and system for providing third party authentification of authorization | |
| CN101981890B (en) | System and method for secure workgroup management and communication | |
| CA2913444C (en) | System and method for user authentication | |
| US11218296B2 (en) | Data de-duplication among untrusted entities | |
| US20030070069A1 (en) | Authentication module for an enterprise access management system | |
| US20120284506A1 (en) | Methods and apparatus for preventing crimeware attacks | |
| EP3036664A1 (en) | Enabling access to data | |
| US11122122B2 (en) | Restricting access to a data storage system on a local network | |
| Gerdes et al. | Datagram transport layer security (dtls) profile for authentication and authorization for constrained environments (ace) | |
| CN111639357B (en) | Encryption network disk system and authentication method and device thereof | |
| EP4470158B1 (en) | Methods, systems, and devices for server control of client authorization proof of possession | |
| TWI856757B (en) | Cyber security authentication method for non-internet electronic device | |
| WO2023144499A1 (en) | Methods, systems, and devices for server control of client authorization proof of possession | |
| CN117203940A (en) | Ciphertext verification |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: NEWBAY RESEARCH LIMITED, IRELAND Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:FARRELL, STEPHEN;DEHORA, BILL;COUGHLAN, SEAN;AND OTHERS;SIGNING DATES FROM 20100610 TO 20100625;REEL/FRAME:024606/0304 |
|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
| FEPP | Fee payment procedure |
Free format text: PAT HOLDER NO LONGER CLAIMS SMALL ENTITY STATUS, ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: STOL); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
| AS | Assignment |
Owner name: SYNCHRONOSS SOFTWARE IRELAND LIMITED, IRELAND Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NEWBAY RESEARCH LIMITED;REEL/FRAME:037419/0163 Effective date: 20130625 |
|
| FPAY | Fee payment |
Year of fee payment: 4 |
|
| MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |
|
| AS | Assignment |
Owner name: BGC LENDER REP LLC, AS ADMINISTRATIVE AGENT, NEW YORK Free format text: SECURITY AGREEMENT;ASSIGNORS:SYNCHRONOSS TECHNOLOGIES, INC.;SYNCHRONOSS SOFTWARE IRELAND LIMITED;REEL/FRAME:067964/0628 Effective date: 20240628 |
|
| MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 12 |